recentpopularlog in

e2b : security   486

« earlier  
cjs/symantec-vip-otp-generator: FOSS-variant of Symantec's VeriSign Identity Protection to generate compliant TOTP otpauth:// URIs
FOSS-variant of Symantec's VeriSign Identity Protection to generate compliant TOTP otpauth:// URIs - cjs/symantec-vip-otp-generator
paypal  2fa  symantec  cli  security  otp 
5 hours ago by e2b
cyrozap/python-vipaccess: A free software implementation of Symantec's VIP Access application and protocol
A free software implementation of Symantec's VIP Access application and protocol - cyrozap/python-vipaccess
paypal  2fa  symantec  cli  security  otp 
5 hours ago by e2b
Keycloak
Keycloak is an open source identity and access management solution
api  auth  authentication  opensource  openid  kerberos  ldap  oauth  security 
3 days ago by e2b
How to write a rootkit without really trying | Trail of Bits Blog
We open-sourced a fault injection tool, KRF, that uses kernel-space syscall interception. You can use it today to find faulty assumptions (and resultant bugs) in your programs. Check it out! This post covers intercepting system calls from within the Linux kernel, via a plain old kernel module. We'll go through a quick refresher on syscalls…
rootkit  programming  algorithms  malware  security  linux 
15 days ago by e2b
Remote Code Execution in apt/apt-get
tl;dr I found a vulnerability in apt that allows a network man-in-the-middle (or a malicious package mirror) to execute arbitrary code as root on a machine i...
linux  security  debian  apt  https 
27 days ago by e2b
How to Find Hidden Cameras and Spy Bugs (The Professional Way) - Sentel Tech Security
How to Find Hidden Cameras and Spy Bugs (The Professional Way) is an in depth guide on how to find and identify hidden cameras, GPS trackers, and secret audio bugs. The guide uses techniques that anyone can use, along with some low cost detectors that will find most any covert bug
security  surveillance  privacy  guide  cameras  spying 
29 days ago by e2b
Security Checklist
A checklist for staying safe on the internet
security  privacy  bestpractices  checklist  internet 
4 weeks ago by e2b
FiloSottile/mkcert: A simple zero-config tool to make locally trusted development certificates with any names you'd like.
A simple zero-config tool to make locally trusted development certificates with any names you'd like. - FiloSottile/mkcert
ssl  localhost  security  golang  certificate  development 
5 weeks ago by e2b
Turtl: The secure, collaborative notebook | Turtl
The safe way to remember everything. Take all your important data with you.
notes  app  android  web  opensource  evernote  security  encryption 
9 weeks ago by e2b
Deseat.me
Instantly get a list of all your accounts, delete the ones you are not using.
email  privacy  internet  delete  social  account  security 
12 weeks ago by e2b
The Illustrated TLS 1.3 Connection: Every Byte Explained
Every byte of a TLS 1.3 connection explained and reproduced
https  ssl  security  reference  networking 
12 weeks ago by e2b
Ruby on Rails Security – The Set List – Medium
We talk to a lot of folks about Rails, from VCs looking to staff their next company to new coding bootcamp grads. And one thing we see from newcomers and veterans alike is a lack of knowledge of web…
rails  security 
november 2018 by e2b
Cryptee | Private, Secure, Encrypted Documents & Photos
Cryptee is a zero-knowledge, cross-platform, encrypted photos, documents, notes and files app. Encrypted Notes? Encrypted Docs? Encrypted Files? You got it.
cloud  encryption  documents  backup  encrypted  online  photos  security  storage 
september 2018 by e2b
Analyze | Webbkoll - dataskydd.net
This tool helps you check what data-protecting measures a site has taken to help you exercise control over your privacy.
gdpr  privacy  tracking  security  web  tools  scanning 
july 2018 by e2b
Wire · The most secure collaboration platform
Business chats, one-click conference calls and shared documents – all protected with end-to-end encryption. Also available for personal use.
app  encryption  chat  security  messaging  collaboration  android  ios  mac 
june 2018 by e2b
ShellCheck – shell script analysis tool
ShellCheck is an open source static anaylsis tool that automatically finds bugs in your shell scripts.
bash  shell  programming  analysis  linter  security 
june 2018 by e2b
Signing CryptPad | CryptPad Blog
CryptPad was designed with a view that privacy should be default and cryptography should be invisible. In order to do this, we made use of the web-app model so people could just go to cryptpad.fr and
security  web 
june 2018 by e2b
A cartoon intro to DNS over HTTPS – Mozilla Hacks – the Web developer blog
At Mozilla, we closely track threats to users' privacy and security. This is why we've added tracking protection to Firefox and created the Facebook container extension. In today's cartoon intro, ...
dns  https  security 
june 2018 by e2b
Guide to IP Layer Network Administration with Linux
This guide provides an overview of many of the tools available for IP network administration of the linux operating system, kernels in the 2.2 and 2.4 series. It covers Ethernet, ARP, IP routing, NAT, and other topics central to the management of IP networks.
linux  network  guide  reference  networking  administration  firewall  security 
may 2018 by e2b
shellharden/how_to_do_things_safely_in_bash.md at master · anordal/shellharden
GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects.
linux  programming  shell  bash  security  best-practices  scripting  cli  bestpractices 
may 2018 by e2b
Moloch
An open source, large scale, full packet capturing, indexing, and database system. Stop using slow tools to dissect and search your packets, let Moloch do the grunt work for you!
packet  network  pcap  capture  security  ids 
may 2018 by e2b
PagerDuty Security Training
Public versions of PagerDuty's employee security training courses.
security  learning  courses  training 
may 2018 by e2b
grahamgilbert/Crypt-Server: A Django webapp to escrow filevault keys sent by the Crypt client app.
GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects.
filevault  fde  mac  security 
may 2018 by e2b
google/gvisor: Container Runtime Sandbox
GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects.
docker  security  google  golang  containers  container  kernel  sandbox  opensource 
may 2018 by e2b
Analyze | Webbkoll - dataskydd.net
This tool helps you check what data-protecting measures a site has taken to help you exercise control over your privacy.
opensource  browser  privacy  security  web  tools  test 
may 2018 by e2b
hannob/snallygaster: Tool to scan for secret files on HTTP servers
GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects.
web  security  scanning 
april 2018 by e2b
Web Application Penetration Testing Cheat Sheet | JDow.io
This cheatsheet is intended to run down the typical steps performed when conducting a web application penetration test. I will break these steps down into sub-tasks and describe the tools I recommend using at each level.
cheatsheet  web  security  pentest  testing  infosec  pentesting  programming 
april 2018 by e2b
trailofbits/algo: Set up a personal IPSEC VPN in the cloud
GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects.
linux  security  vpn  ansible  privacy  ipsec  cloud  opensource 
april 2018 by e2b
ierror/ssh-permit-a38: Central managment and deployment for SSH keys
GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects.
ssh  aws  rust  security  deployment 
march 2018 by e2b
Randall Degges - Please Stop Using Local Storage
Stop using local storage to store sensitive information. If you're putting a JWT in local storage you're doing it wrong.
javascript  security  architecture  localstorage  web 
march 2018 by e2b
Exim Off-by-one RCE: Exploiting CVE-2018-6789 with Fully Mitigations Bypassing | DEVCORE
We reported an overflow vulnerability in the base64 decode function of Exim on 5 February, 2018, identified as CVE-2018-6789. This bug exists since the first commit of exim, hence ALL versions are affected. According to our research, it can be leveraged to gain Pre-auth Remote Code Execution and at least 400k servers are at risk. Patched version 4.90.1 is already released and we suggest to upgrade exim immediately.
binary  security 
march 2018 by e2b
Srinivas11789/PcapXray: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
:snowflake: PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
pcap  networking  security  python  wireshark  research  ba 
march 2018 by e2b
infosec.mozilla.org
infosec.mozilla.org : Guidelines, principles published on https://infosec.mozilla.org
mozilla  security  guidelines 
march 2018 by e2b
dlenski/python-vipaccess: A free software implementation of Symantec's VIP Access application and protocol
python-vipaccess - A free software implementation of Symantec's VIP Access application and protocol
python  totp  symantec  paypal  2fa  cli  security  otp 
february 2018 by e2b
DroidID – Android-Apps auf Google Play
DroidID können Sie Ihren Mac mit Ihrem Android-Gerät des Fingerabdrucksensors entsperren
mac  app  android  lock  security 
february 2018 by e2b
caesar0301/awesome-pcaptools: A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
network  security  tools  bro  pcap  tcpdump  list  collection  awesome 
february 2018 by e2b
Public PCAP files for download
A list of publicly available pcap files / network traces that can be downloaded for free
pcap  network  security  analysis  ba 
february 2018 by e2b
StevenBlack/hosts: Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke extensions to block additional sites by c
Extending and consolidating hosts files from several well-curated sources like adaway.org, mvps.org, malwaredomainlist.com, someonewhocares.org, and potentially others. You can optionally invoke extensions to block additional sites by category.
security  hosts  adblock  networking  network  filter  privacy 
january 2018 by e2b
chatsecure.github.io
Free and open source encrypted chat for iOS.
xmpp  jabber  encryption  ios  app  security  messenger 
january 2018 by e2b
The Motherboard Guide to Not Getting Hacked - Motherboard
Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? We have all the answers on how to protect yourself.
security  privacy  hacking  computer  guide 
january 2018 by e2b
encryption-works/encryption_works.md at master · freedomofpress/encryption-works
encryption-works - Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance
encryption  privacy  security  guide 
january 2018 by e2b
SQL Injection Wiki
This wiki's mission is to be a one stop resource for fully identifying, exploiting, and escalating SQL injection vulnerabilities across various Database Management Systems
cheatsheet  security  database  sql  injection  wiki  reference  hacking 
december 2017 by e2b
/bin/bash based SSL/TLS tester: testssl.sh
TLS/SSL security testing with open source software
tls  ssl  security  opensource  tool 
december 2017 by e2b
crt.sh | Certificate Search
Free CT Log Certificate Search Tool from COMODO
ssl  security  tls  certificate  letsencrypt 
december 2017 by e2b
Security Planner
Improve your online safety with tools for your needs. Answer a few simple questions to get personalized recommendations of free and open-source software. It's confidential -- no personal information is stored, and we won't access any of your online accounts.
security  privacy  encryption  citizenlab  guide  beginner 
december 2017 by e2b
SSH vs OpenVPN for Tunneling | BackSlasher
Update 28.01.16 I found some sites referring to this post. Below are the common complaints I saw, and my replies: I'm criminally bad with setting up OpenVPN, meaning the testing is completely off I'm not an expert in networking, but I have a working knowledge of ...
vpn  openvpn  security  tunnel  ssh  benchmarks  bestpractices 
november 2017 by e2b
« earlier      
per page:    204080120160

Copy this bookmark:





to read